Aggregator
CVE-2024-23280 | Apple watchOS Webpage information disclosure (FEDORA-2024-7ee03010c5)
CVE-2024-2238 | Premium Addons Pro Plugin up to 2.9.12 on WordPress Custom Mouse Cursor Module cross site scripting
CVE-2024-2239 | Premium Addons Pro Plugin up to 2.9.12 on WordPress Premium Magic Scroll Module cross site scripting
Windows Task Scheduler Vulnerabilities Allow Attackers Gain Admin Account Control
New vulnerabilities in Windows Task Scheduler’s schtasks.exe let attackers bypass UAC, alter metadata, modify event logs, and evade detection. These actions map to MITRE ATT&CK tactics: Persistence, Privilege Escalation, Execution, Lateral Movement, and Defense Evasion. Abuse of schtasks.exe enables stealthy task creation and manipulation without alerting defenders, making it a reliable tool for maintaining access […]
The post Windows Task Scheduler Vulnerabilities Allow Attackers Gain Admin Account Control appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
People’s Republic of China activity targeting network edge routers: Observations and mitigation strategies
Beware of Online PDF Converters That Tricks Users to Install Password Stealing Malware
Cybercriminals have launched a sophisticated malware campaign leveraging fake PDF-to-DOCX converter websites that mimic the popular legitimate service PDFCandy. The malicious websites, including domains such as candyxpdf[.]com and candyconverterpdf[.]com, deploy an elaborate social engineering tactic designed to harvest sensitive information from unsuspecting users seeking to convert document formats. When users attempt to convert documents on […]
The post Beware of Online PDF Converters That Tricks Users to Install Password Stealing Malware appeared first on Cyber Security News.